General
-
Target
Bootstrapper.exe
-
Size
889KB
-
Sample
241111-t57c2szrgy
-
MD5
4a38f2fd264d3753024a560d0aaaa299
-
SHA1
0e1bbf0e5fd66a4b731af686966f220d8b31e0e9
-
SHA256
22164bae356ca295b6591f06832d663b48fe71ecf14cac212e446ce28bc27114
-
SHA512
68208d1b48c5be93501426f37eb3582b30c5f4752d0addd614c8a51edeec4c9abebd44894163d30f0f437631e0b96657060ff81ad8a0e60dbe4b17d933352956
-
SSDEEP
12288:SiJzQUyRS7vjzyGaL94l68NoS/S3iorPzSCH8MGSD2vKo7pnyzRyRB4c/YP8Mp1c:SiJsUG2KGaZ4OSa3hBH83S2pgzNbGp
Static task
static1
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xworm
hrgj7va.localto.net:5261
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Bootstrapper.exe
-
Size
889KB
-
MD5
4a38f2fd264d3753024a560d0aaaa299
-
SHA1
0e1bbf0e5fd66a4b731af686966f220d8b31e0e9
-
SHA256
22164bae356ca295b6591f06832d663b48fe71ecf14cac212e446ce28bc27114
-
SHA512
68208d1b48c5be93501426f37eb3582b30c5f4752d0addd614c8a51edeec4c9abebd44894163d30f0f437631e0b96657060ff81ad8a0e60dbe4b17d933352956
-
SSDEEP
12288:SiJzQUyRS7vjzyGaL94l68NoS/S3iorPzSCH8MGSD2vKo7pnyzRyRB4c/YP8Mp1c:SiJsUG2KGaZ4OSa3hBH83S2pgzNbGp
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1